Showing 12,301 - 12,320 results of 19,511 for search '"Algorithm"', query time: 0.11s Refine Results
  1. 12301

    Fault diagnosis method of timing signal based on Nadam-TimeGAN and XGBoost by HEI Xinhong, GAO Miao, ZHANG Kuan, FEI Rong, QIU Yuan, JI Wenjiang

    Published 2024-04-01
    “…The Nadam optimization algorithm was used to optimize the components of the TimeGAN model, that was, the Nadam-TimeGAN model was constructed for data expansion. …”
    Get full text
    Article
  2. 12302

    A Superposition Based Diffraction Technique to Study Site Effects in Earthquake Engineering by Juan Gomez, Juan Jaramillo, Mario Saenz, Juan Vergara

    Published 2016-01-01
    “…A detailed, step-by-step algorithm to apply the method is presented with regard to the simple problem of scattering by a V-shaped canyon. …”
    Get full text
    Article
  3. 12303

    Deterministic local multi-point fault detection method for industrial control topology by Ruozhou LIANG, Xibin ZHAO, Hai WAN

    Published 2021-10-01
    “…In view of the fact that the existing network fault detection algorithms cannot meet the four requirements of determination of detection time, low detection overhead, multi-point fault detection ability and topology adaptability of industrial control network at the same time, a multi-point fault detection method of time sensitive network based on Boolean network mapping was proposed.The method was divided into offline preparation phase and online detection phase.In the offline preparation phase, the detection flow generation algorithm generated a set of detection flows based on the network topology.The detection flow set covered the edges of the network topology.In the online detection phase, the detection packet was sent periodically from the source node to the controller according to the predefined path.Then, the controller inferred the failed link according to the arrival state of each detection packet.The experimental results show that, compared with the existing methods, the proposed method can accurately identify multiple failed links in a certain time, and generate fewer detection path sets to meet the above four requirements.…”
    Get full text
    Article
  4. 12304

    Routing and Clustering of Sensor Nodes in the Honeycomb Architecture by Amine Rais, Khalid Bouragba, Mohammed Ouzzif

    Published 2019-01-01
    “…In this article, we choose to use a hybrid routing protocol named Efficient Honeycomb Clustering Algorithm (EHCA), which is at the same time hierarchical and geographical protocol by using honeycomb clustering. …”
    Get full text
    Article
  5. 12305

    Improved Optimization Study of Integration Strategies in Solar Aided Coal-Fired Power Generation System by Rongrong Zhai, Miaomiao Zhao, Chao Li, Pan Peng, Yongping Yang

    Published 2015-01-01
    “…This study mainly improves the solar thermal storage system. Genetic algorithm is used to optimize the SACFPGS. The best integration approach of the system, the collector area, and the corresponding thermal storage capacity to replace each high-pressure extraction are obtained when the amount of coal saving in unit solar investment per hour is at its largest. …”
    Get full text
    Article
  6. 12306

    Comparing the Linear and Quadratic Discriminant Analysis of Diabetes Disease Classification Based on Data Multicollinearity by Autcha Araveeporn

    Published 2022-01-01
    “…However, the MVE and t-distribution methods focus on the resampling algorithm, a reliable tool for high resistance. This paper starts by explaining the concepts of linear and quadratic discriminant analysis and then presents the four other methods used to create the decision boundary. …”
    Get full text
    Article
  7. 12307

    A safe-enhanced fully closed-loop artificial pancreas controller based on deep reinforcement learning. by Yan Feng Zhao, Jun Kit Chaw, Mei Choo Ang, Yiqi Tew, Xiao Yang Shi, Lin Liu, Xiang Cheng

    Published 2025-01-01
    “…It employed ten tricks to enhance the proximal policy optimization (PPO) algorithm, improving training efficiency. Additionally, a dual safety mechanism of 'proactive guidance + reactive correction' was introduced to reduce the risks of hyperglycemia and hypoglycemia and to prevent emergencies. …”
    Get full text
    Article
  8. 12308

    Control of Limit Cycle Oscillation in a Three Degrees of Freedom Airfoil Section Using Fuzzy Takagi-Sugeno Modeling by Douglas Domingues Bueno, Luiz Carlos Sandoval Góes, Paulo José Paupitz Gonçalves

    Published 2014-01-01
    “…Time simulations with different initial conditions are performed using a modified Runge-Kutta algorithm to compare the system with and without control forces. …”
    Get full text
    Article
  9. 12309

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article
  10. 12310

    Research on the integration of MEMS and reliable transmission of deep space networks based on time-sensitive networking by Kejun Sheng, Ziyang Xing

    Published 2025-01-01
    “…Experimental results have shown that the proposed algorithm has fast convergence, strong applicability, and can achieve reliable and efficient data transmission while meeting the requirements of higher priority data transmission. …”
    Get full text
    Article
  11. 12311

    Delay Minimization for BAC-NOMA Offloading in UAV Networks by Haodong Li, Zhengkai Yin, Changsheng Chen

    Published 2024-12-01
    “…By converting the initially non-convex problem into a convex one, an iterative algorithm is developed to solve it. Simulation results demonstrate that the proposed protocol significantly reduces offloading delays relative to existing benchmarks.…”
    Get full text
    Article
  12. 12312

    Optimal dispatch method of virtual power plant considering electric vehicle V2G under the low carbon target by YU Zhuo, MEN Jinbao, WANG Jun, LYU Hai, OUYANG Hong

    Published 2024-07-01
    “…The model was solved by particle swarm optimization algorithm. Imental analysis based on example model combined with real vas conducted. …”
    Get full text
    Article
  13. 12313

    Time Effort Prediction Of Agile Software Development Using Machine Learning Techniques by Muchamad Bachram Shidiq, Windu Gata, Sigit Kurniawan, Dedi Dwi Saputra, Supriadi Panggabean

    Published 2023-12-01
    “…The best-performing algorithm uses Gradient Boosting k-fold validation with PCA with an MSE value of 2.895, RMSE 1.701, MAE 0.898, and R2 0.951.…”
    Get full text
    Article
  14. 12314

    VIBRATION FATIGUE ANALYSIS AND OPTIMAL DESIGN OF ALTERNATOR BRACKET by LU Jian, ZHONG ZiFeng

    Published 2019-01-01
    “…Thirdly, the alternator bracket was optimal designed by adopting large scale generalized reduced gradient algorithm, it can meet fatigue and strength performance requirements after optimization. …”
    Get full text
    Article
  15. 12315

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…By using the unique orbital properties of Phobos and Deimos, this method creates a dynamic encryption algorithm. The approach involves dividing the alphabet into groups and applying shifting techniques based on Deimos’ positions, enhancing data security through increased complexity. …”
    Get full text
    Article
  16. 12316

    Parameterization-based trajectory planning for an 8-DOF manipulator with multiple constraints by Ziwu Ren, Zhongyuan Wang, Xiaohan Liu, Rui Lin

    Published 2025-03-01
    “…Then teaching–learning-based optimization (TLBO) algorithm is employed to search for the redundant parameters to generate an optimal trajectory. …”
    Get full text
    Article
  17. 12317

    Network and Agent Dynamics with Evolving Protection against Systemic Risk by Chulwook Park

    Published 2020-01-01
    “…In this paper, we show how to construct a large variety of behaviors by applying a simple algorithm to networked agents, which could, conceivably, offer a straightforward way out of the complexity. …”
    Get full text
    Article
  18. 12318

    An Artistic Image Fusion Method with Improved Cartoon-Texture Decomposition by Zhou Meng

    Published 2022-01-01
    “…According to the oscillation component’s strong repetitiveness and structural directionality, the image texture part is filtered by combining the improved directional diffusion algorithm. Using the sparse coefficients of the fused cartoon component and the sparse coefficients of the texture component, the cartoon and texture of the image is inverse transformed and weighted and summed to obtain the recovered image after fusion. …”
    Get full text
    Article
  19. 12319

    Research and Application of 3D Clothing Design Based on Deep Learning by Chunnan Cao

    Published 2022-01-01
    “…Simulation results show that for the training of convolutional neural networks in the research of feature recognition algorithms the final feature recognition accuracy is made to reach 92.56%. …”
    Get full text
    Article
  20. 12320

    Interoperability of Multimedia Network Public Opinion Knowledge Base Group Based on Multisource Text Mining by Yanru Zhu

    Published 2021-01-01
    “…The results of the case analysis show that the multisource text mining algorithm can provide a strong basis for the construction of a multimedia network public opinion knowledge base group.…”
    Get full text
    Article